Ontology-based Access Control Policy Interoperability

Quentin Reul, Gang Zhao, Robert Meersman

Research output: Chapter in Book/Report/Conference proceedingConference paper

Abstract

As personal data is generated over a human life, it is collected and stored at distributed locations and is used by a multitude of services. Such service-oriented architecture (SOA) relies on semantic interoperability to enable secure access to personal data based on a common vocabulary. However, existing languages, such as XACML, provides a data model as it lacks the element of semantic agreement beyond the boundary of the organization that developed it. Thus, semantic interoperability across services based on these languages is not feasible.

In this paper, we present a security policy ontology based on the DOGMA framework. Given this security policy ontology and ontologies representing their respective security domains, services requesters (SRs) and service providers (SPs) interoperate with each other with the facility of interpretation of attribute types and their values in a request. Thus, this approach removes the impractical restriction on SRs and SPs in distributed environment to share identical vocabularies to describe the conceptual model of their respective security domains.
Original languageEnglish
Title of host publicationProceedings of the 1st International Conference on Mobility, Individualisation, Socialisation and Connectivity (MISC 2010)
Publication statusPublished - 22 Jan 2010
EventFinds and Results from the Swedish Cyprus Expedition: A Gender Perspective at the Medelhavsmuseet - Stockholm, Sweden
Duration: 21 Sep 200925 Sep 2009

Publication series

NameProceedings of the 1st International Conference on Mobility, Individualisation, Socialisation and Connectivity (MISC 2010)

Conference

ConferenceFinds and Results from the Swedish Cyprus Expedition: A Gender Perspective at the Medelhavsmuseet
CountrySweden
CityStockholm
Period21/09/0925/09/09

Keywords

  • ontology
  • access control policy
  • interoperability
  • security

Fingerprint

Dive into the research topics of 'Ontology-based Access Control Policy Interoperability'. Together they form a unique fingerprint.

Cite this